Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Identity and Access Administrator Exam Guide

You're reading from   Microsoft Identity and Access Administrator Exam Guide Implement IAM solutions with Azure AD, build an identity governance strategy, and pass the SC-300 exam

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781801818049
Length 452 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Dwayne Natwick Dwayne Natwick
Author Profile Icon Dwayne Natwick
Dwayne Natwick
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Section 1 – Exam Overview and the Evolution of Identity and Access Management
2. Chapter 1: Preparing for Your Microsoft Exam FREE CHAPTER 3. Chapter 2: Defining Identity and Access Management 4. Section 2 - Implementing an Identity Management Solution
5. Chapter 3: Implementing and Configuring Azure Active Directory 6. Chapter 4: Creating, Configuring, and Managing Identities 7. Chapter 5: Implementing and Managing External Identities and Guests 8. Chapter 6: Implementing and Managing Hybrid Identities 9. Section 3 – Implementing an Authentication and Access Management Solution
10. Chapter 7: Planning and Implementing Azure Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) 11. Chapter 8: Planning and Managing Password-Less Authentication Methods 12. Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection 13. Section 4 – Implementing Access Management for Applications
14. Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO) 15. Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps 16. Section 5 – Planning and Implementing an Identity Governance Strategy
17. Chapter 12: Planning and Implementing Entitlement Management 18. Chapter 13: Planning and Implementing Privileged Access and Access Reviews 19. Section 6 – Monitoring and Maintaining Azure Active Directory
20. Chapter 14: Analyzing and Investigating Sign-in Logs and Elevated Risk Users 21. Chapter 15: Enabling and Integrating Azure AD Logs with SIEM Solutions 22. Chapter 16: Mock Test 23. Other Books You May Enjoy

What this book covers

Chapter 1, Preparing for Your Microsoft Exam, provides guidance on getting prepared for a Microsoft exam along with resources that can assist in your learning plan. This will include helpful links along with steps for gaining access to a trial Microsoft 365 subscription for hands-on practice.

Chapter 2, Defining Identity and Access Management, provides an overview of what IAM is and why it is important. This chapter will also discuss the evolution of IAM as cloud technologies have become more prevalent.

Chapter 3, Implementing and Configuring Azure Active Directory, focuses on the implementation and configuration of Azure Active Directory for cloud identities. This will include how to configure and verify custom domains and tenant-wide settings.

Chapter 4, Creating, Configuring, and Managing Identities, discusses how to plan, create, configure, and manage users, groups, and licenses within Azure Active Directory. This will include the bulk creation of users and dynamic group creation.

Chapter 5, Implementing and Managing External Identities and Guests, discusses how to plan and provide guest user access to Azure Active Directory. This will include how to invite guest users and how to manage access. The chapter will also discuss utilizing existing user identities with B2B and B2C access.

Chapter 6, Implementing and Managing Hybrid Identities, focuses on the planning and implementation of hybrid identity. This will include configuration of Azure Active Directory Connect for Windows Active Directory to Azure Active Directory and determining which synchronization type is the best fit for an organization.

Chapter 7, Planning and Implementing Azure Multi-Factor Authentication and Self-Service Password Reset, discusses the planning and implementation of Azure MFA and SSPR for users and groups. This will include deploying, managing, and configuring MFA for users and groups. This chapter will also cover the differences between verifying identity with MFA and SSPR.

Chapter 8, Planning and Managing Password-Less Authentication Methods, discusses how to plan and utilize password-less authentication methods. It will cover the various methods and how they can be deployed within Azure Active Directory.

Chapter 9, Planning, Implementing, and Administering Conditional Access and Azure Identity Protection, covers conditional access policies. This will include planning for these policies and testing them to verify that they are working correctly and providing the proper controls. In addition, we will discuss Azure Identity Protection and using sign-in and user risk conditions with policies.

Chapter 10, Planning and Implementing Enterprise Apps for Single Sign-On (SSO), focuses on enterprise applications and how to plan and implement SSO. This will include setting up an application proxy for connecting on-premises applications to Azure Active Directory.

Chapter 11, Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps, discusses how Microsoft Defender for Cloud Apps is used to manage and monitor enterprise cloud applications. This includes how to utilize conditional access policies for cloud application access.

Chapter 12, Planning and Implementing Entitlement Management, discusses the planning and implementation process for entitlement management. This includes life cycle management for external users and managing the terms of use.

Chapter 13, Planning and Implementing Privileged Access and Access Reviews, discusses the planning and implementation for user privileged access. This will include how to determine and assign users with privileged access rights on a just-in-time basis. This chapter will also cover planning for access reviews.

Chapter 14, Analyzing and Investigating Sign-in Logs and Elevated Risk Users, discusses how to analyze and investigate sign-in logs and determine risks to elevated users.

Chapter 15, Enabling and Integrating Azure AD Logs with SIEM Solutions, discusses how Azure Active Directory logs can be integrated into SIEM solutions. This will include Azure Sentinel and third-party SIEM.

Chapter 16, Mock Test, provides a final assessment and mock exam questions to complete the final preparations to take the SC-300 exam.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image